Description
In the Linux kernel, the following vulnerability has been resolved:

xfs: check return value of xchk_scrub_create_subord

Fix this function to return NULL instead of a mangled ENOMEM, then fix
the callers to actually check for a null pointer and return ENOMEM.
Most of the corrections here are for code merged between 6.2 and 6.10.
Published: 2026-03-18
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A flaw in the Linux kernel’s XFS subsystem causes a failure to properly handle a null return value from the xchk_scrub_create_subord function. The function was returning a malformed ENOMEM value instead of NULL, and callers were not verifying the pointer. This oversight can lead to improper memory accesses that may trigger a kernel panic, effectively denying service to the affected system. This constitutes a null pointer dereference identified as CWE-476.

Affected Systems

The vulnerability affects any system running a Linux kernel version that incorporates the code merged between releases 6.2 and 6.10. All distributions that ship these kernels without the specified patch are potentially impacted.

Risk and Exploitability

The CVSS base score for this issue is 5.5, indicating a medium severity. However, the EPSS score is reported as less than 1 percent and the vulnerability is not listed in the CISA KEV catalog, suggesting a low current exploitation likelihood. The attack vector is likely local, requiring an attacker to trigger XFS scrub operations or otherwise invoke the affected internal function. Exploitation would result in a kernel crash rather than privilege elevation or data compromise.

Generated by OpenCVE AI on May 21, 2026 at 19:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a kernel update that includes the fix for CVE-2026-23250, such as installing the latest stable release or backporting the patch from the kernel repository.
  • If immediate kernel upgrade is not feasible, temporarily disable scheduled XFS scrub operations or prevent triggering the xchk_scrub_create_subord path until the patch is applied.
  • Continuously monitor system logs for XFS scrub failures or kernel panics and be prepared to perform an emergency reboot or patch rollback if the vulnerability is inadvertently triggered.

Generated by OpenCVE AI on May 21, 2026 at 19:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Thu, 21 May 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-476
Metrics cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-703

Wed, 25 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-703

Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-690

Tue, 24 Mar 2026 13:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-690

Thu, 19 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.0, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}

threat_severity

Moderate


Wed, 18 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: xfs: check return value of xchk_scrub_create_subord Fix this function to return NULL instead of a mangled ENOMEM, then fix the callers to actually check for a null pointer and return ENOMEM. Most of the corrections here are for code merged between 6.2 and 6.10.
Title xfs: check return value of xchk_scrub_create_subord
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:03:13.623Z

Reserved: 2026-01-13T15:37:45.990Z

Link: CVE-2026-23250

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-18T18:16:22.950

Modified: 2026-05-21T18:32:11.127

Link: CVE-2026-23250

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2026-23250 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T20:00:16Z

Weaknesses